A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. These Trojans can look for specific pre-defined data (e.g., just credit card information or passwords), or they could install a keylogger and send all recorded keystrokes back to the attacker.
- Datagram Congestion Control Protocol
DCCP, short for Datagram Congestion Control Protocol, is a minimal general purpose transport-layer protocol that minimizes the overhead of packet header size or end-node processing as much as possible. DCCP provides the establishment, maintenance and teardown of an unreliable packet flow, as well as the congestion control of that packet flow. [Adapted from Datagram Congestion […]
A query language for deductive databases that is based on logical facts and rules. It’s similar to Prolog which has no data structures and is based on formal logic.
Short for Decrypt CSS, an algorithm for circumventing the CSS copy protection used in DVDs, allowing the decryption of the digital data. In the U.S., the DeCSS algorithm is considered to be a violation of DMCA 1201.
Pronounced “deb-EE-uhn.” Short for Debian GNU/Linux or Debian GNU/Hurd, an open source operating system that uses the Linux or Hurd kernel, respectively. Debian continues to be developed by more than 500 contributors who comprise the Debian Project. The software can be downloaded over the Internet or purchased on CD-ROM. The Debian software project was started […]
- Defense In-Depth
A security and antivirus term used to describe an approach to system security where multiple layers of security are deployed to guard against failure of one component or layer.